<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dual ISP mapped to two different VR route, ISP Failover is not working in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557898#M1837</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/230645"&gt;@AkashThangavel&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having separate Virtual-Routers for the two ISP should work for Internet failover.&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109098"&gt;@ozheng&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179341"&gt;@149999mah3&lt;/a&gt; already mentioned you don't really need to have two separate VRs, but it should still work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Main VR:&lt;/P&gt;
&lt;P&gt;- Assign primary ISP interface in main-vr&lt;/P&gt;
&lt;P&gt;- Assign ISP interface to "Internet/Outside" zone&lt;/P&gt;
&lt;P&gt;- Assign LAN (to your internal networks)&amp;nbsp; interface in main-vr&lt;/P&gt;
&lt;P&gt;- Create static&amp;nbsp; default route pointing&amp;nbsp; to primary ISP. Enable path-monitor on this static route&lt;/P&gt;
&lt;P&gt;- Create second static default route pointing to "next-vr secondary-vr".&amp;nbsp; Set metric higher than the default (let say 50)&lt;/P&gt;
&lt;P&gt;Secondary VR:&lt;/P&gt;
&lt;P&gt;- Assing secondary ISP&amp;nbsp; interface in secondary-vr&lt;/P&gt;
&lt;P&gt;- Assign ISP interface to the same "Internet/Outside" zone&lt;/P&gt;
&lt;P&gt;- Create static default route pointing to secondary&amp;nbsp; ISP. (optional enable path-monitor on this&amp;nbsp; static route)&lt;/P&gt;
&lt;P&gt;- Create static route for your internal summarized subnet (/8, /12, /16) pointing to next-vr main-vr.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT Policy&lt;/P&gt;
&lt;P&gt;- Create rule:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Source Zone "LAN/Internal" and source summairized internal subnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Destination Zone "Internet/Outside" and dest address&amp;nbsp; any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - (Must) select egress interface to be the interface connected to primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Enable&amp;nbsp; Source translation to public from primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Create second NAT rule:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Same source&amp;nbsp; lan zone&amp;nbsp; and subnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Same destination&amp;nbsp; internet zone and any address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - (Must) Select egress interface to be interface connected to secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Enable source translation to public IP from secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When using primary ISP:&lt;/P&gt;
&lt;P&gt;- Traffic from internal users will enter main-vr&lt;/P&gt;
&lt;P&gt;- Traffic will follow&amp;nbsp; default route with lower metric and&amp;nbsp; egress&amp;nbsp; to primary ISP&lt;/P&gt;
&lt;P&gt;- First NAT rule will be used, because traffic will match the egress interface and&amp;nbsp; apply translation to public IP from primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When primary ISP is down:&lt;/P&gt;
&lt;P&gt;- Path-monitor will detect issues and "deactivate"&amp;nbsp; the static route to primary ISP&lt;/P&gt;
&lt;P&gt;- Traffic from internal users will enter main-vr&lt;/P&gt;
&lt;P&gt;- Traffic&amp;nbsp; will follow second default&amp;nbsp; route pointing to next-vr (because it is currently only default available)&lt;/P&gt;
&lt;P&gt;- Traffic will enter secondary-vr and follow default route pointing to secondary ISP (as only availalbe default in that vr)&lt;/P&gt;
&lt;P&gt;- Second NAT rule will be applied, because traffic is now egressing via interface that does not match first NAT.&amp;nbsp; This will apply translation to public IP from secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When primary ISP is restored:&lt;/P&gt;
&lt;P&gt;- Path-monitor will detect the availability of the&amp;nbsp; monitored IP and will restore the&amp;nbsp; default&amp;nbsp; route&lt;/P&gt;
&lt;P&gt;- Traffic from users will follow restored route to primary ISP&lt;/P&gt;
&lt;P&gt;- First NAT will be applied as it will match the egress interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Sep 2023 09:04:44 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-09-14T09:04:44Z</dc:date>
    <item>
      <title>Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557293#M1810</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Will ISP failover work, if 2 ISPs are mapped to two different VR routes? If no please say the workaround apart from changing the VR route to single.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and regards,&lt;/P&gt;
&lt;P&gt;Akash Thangavel&lt;/P&gt;
&lt;P&gt;Network Security Engineer&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 07:44:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557293#M1810</guid>
      <dc:creator>AkashThangavel</dc:creator>
      <dc:date>2023-09-11T07:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557302#M1811</link>
      <description>&lt;P&gt;Hello AkashThangavel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How's the routing between the main VR and second VR?&lt;BR /&gt;How's the failover supposed to be done when the link on the main VR is down?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any specific reason to have 2 VRs?&lt;/P&gt;
&lt;P&gt;There is a documented configuration for 1VR only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 08:02:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557302#M1811</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2023-09-11T08:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557309#M1813</link>
      <description>&lt;P&gt;Customer setup, will this set up work?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 08:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557309#M1813</guid>
      <dc:creator>AkashThangavel</dc:creator>
      <dc:date>2023-09-11T08:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557542#M1825</link>
      <description>&lt;P&gt;Im pretty sure both internet lines needs to be in the same VR. As far as i know, path monitoring only fails over inside the same VR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/M&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 12:17:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557542#M1825</guid>
      <dc:creator>149999mah3</dc:creator>
      <dc:date>2023-09-12T12:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557876#M1836</link>
      <description>&lt;P&gt;I need a PA document to share with the customer to accept as a SOLUTION.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Akash Thangavel&lt;/P&gt;
&lt;P&gt;Network Security Engineer&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 07:24:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557876#M1836</guid>
      <dc:creator>AkashThangavel</dc:creator>
      <dc:date>2023-09-14T07:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP mapped to two different VR route, ISP Failover is not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557898#M1837</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/230645"&gt;@AkashThangavel&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having separate Virtual-Routers for the two ISP should work for Internet failover.&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109098"&gt;@ozheng&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179341"&gt;@149999mah3&lt;/a&gt; already mentioned you don't really need to have two separate VRs, but it should still work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Main VR:&lt;/P&gt;
&lt;P&gt;- Assign primary ISP interface in main-vr&lt;/P&gt;
&lt;P&gt;- Assign ISP interface to "Internet/Outside" zone&lt;/P&gt;
&lt;P&gt;- Assign LAN (to your internal networks)&amp;nbsp; interface in main-vr&lt;/P&gt;
&lt;P&gt;- Create static&amp;nbsp; default route pointing&amp;nbsp; to primary ISP. Enable path-monitor on this static route&lt;/P&gt;
&lt;P&gt;- Create second static default route pointing to "next-vr secondary-vr".&amp;nbsp; Set metric higher than the default (let say 50)&lt;/P&gt;
&lt;P&gt;Secondary VR:&lt;/P&gt;
&lt;P&gt;- Assing secondary ISP&amp;nbsp; interface in secondary-vr&lt;/P&gt;
&lt;P&gt;- Assign ISP interface to the same "Internet/Outside" zone&lt;/P&gt;
&lt;P&gt;- Create static default route pointing to secondary&amp;nbsp; ISP. (optional enable path-monitor on this&amp;nbsp; static route)&lt;/P&gt;
&lt;P&gt;- Create static route for your internal summarized subnet (/8, /12, /16) pointing to next-vr main-vr.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT Policy&lt;/P&gt;
&lt;P&gt;- Create rule:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Source Zone "LAN/Internal" and source summairized internal subnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Destination Zone "Internet/Outside" and dest address&amp;nbsp; any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - (Must) select egress interface to be the interface connected to primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Enable&amp;nbsp; Source translation to public from primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Create second NAT rule:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Same source&amp;nbsp; lan zone&amp;nbsp; and subnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Same destination&amp;nbsp; internet zone and any address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - (Must) Select egress interface to be interface connected to secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; - Enable source translation to public IP from secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When using primary ISP:&lt;/P&gt;
&lt;P&gt;- Traffic from internal users will enter main-vr&lt;/P&gt;
&lt;P&gt;- Traffic will follow&amp;nbsp; default route with lower metric and&amp;nbsp; egress&amp;nbsp; to primary ISP&lt;/P&gt;
&lt;P&gt;- First NAT rule will be used, because traffic will match the egress interface and&amp;nbsp; apply translation to public IP from primary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When primary ISP is down:&lt;/P&gt;
&lt;P&gt;- Path-monitor will detect issues and "deactivate"&amp;nbsp; the static route to primary ISP&lt;/P&gt;
&lt;P&gt;- Traffic from internal users will enter main-vr&lt;/P&gt;
&lt;P&gt;- Traffic&amp;nbsp; will follow second default&amp;nbsp; route pointing to next-vr (because it is currently only default available)&lt;/P&gt;
&lt;P&gt;- Traffic will enter secondary-vr and follow default route pointing to secondary ISP (as only availalbe default in that vr)&lt;/P&gt;
&lt;P&gt;- Second NAT rule will be applied, because traffic is now egressing via interface that does not match first NAT.&amp;nbsp; This will apply translation to public IP from secondary ISP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When primary ISP is restored:&lt;/P&gt;
&lt;P&gt;- Path-monitor will detect the availability of the&amp;nbsp; monitored IP and will restore the&amp;nbsp; default&amp;nbsp; route&lt;/P&gt;
&lt;P&gt;- Traffic from users will follow restored route to primary ISP&lt;/P&gt;
&lt;P&gt;- First NAT will be applied as it will match the egress interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 09:04:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dual-isp-mapped-to-two-different-vr-route-isp-failover-is-not/m-p/557898#M1837</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-09-14T09:04:44Z</dc:date>
    </item>
  </channel>
</rss>

